Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
24-11-2020 23:47
Static task
static1
Behavioral task
behavioral1
Sample
deed contract.11.20.doc
Resource
win7v20201028
Behavioral task
behavioral2
Sample
deed contract.11.20.doc
Resource
win10v20201028
General
-
Target
deed contract.11.20.doc
-
Size
143KB
-
MD5
98ec9df6254d78b1fc1abdf7090da3f7
-
SHA1
6642cb5d474a9ed788fb5a33cc5b72c6f825c1f3
-
SHA256
37db367c01e40ee2f05a5966d6670e07fd3292c01f4da8ffd77c0e3c96a79464
-
SHA512
dfbc5ff2b935b905ad554b30994dc0446d93e0d8eaeb279ab33c376b35ff1cad6b21931da920c103ab435ac1c2968bcfcc8c3e0db2c3ae2222f5b86ab0460354
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 352 576 rundll32.exe WINWORD.EXE -
Blacklisted process makes network request 6 IoCs
Processes:
rundll32.exeflow pid process 36 2344 rundll32.exe 38 2344 rundll32.exe 40 2344 rundll32.exe 42 2344 rundll32.exe 44 2344 rundll32.exe 46 2344 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2344 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2344 rundll32.exe 2344 rundll32.exe -
Suspicious use of SetWindowsHookEx 18 IoCs
Processes:
WINWORD.EXEpid process 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE 576 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
WINWORD.EXErundll32.exedescription pid process target process PID 576 wrote to memory of 352 576 WINWORD.EXE rundll32.exe PID 576 wrote to memory of 352 576 WINWORD.EXE rundll32.exe PID 352 wrote to memory of 2344 352 rundll32.exe rundll32.exe PID 352 wrote to memory of 2344 352 rundll32.exe rundll32.exe PID 352 wrote to memory of 2344 352 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\deed contract.11.20.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SYSTEM32\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\FpVjp.pdf,ShowDialogA -r2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Admin\AppData\Local\Temp\FpVjp.pdf,ShowDialogA -r3⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
516891dec3d25a43e4c14b5b134956f9
SHA1a01b8fc4157271af97e77bcef71e92ee85333dcb
SHA256ca6dc8b1dada5e2f28db41874f2b572354e3e92f73d18a61404578b4173634bc
SHA512d14807668139f8e3d4b9076872419e59c3b268879b78b87ec7c79e0b01652dc55d5871e0870d8383b830d8bafae171f220b756503588e9c2486b7db5cdb4d161
-
MD5
516891dec3d25a43e4c14b5b134956f9
SHA1a01b8fc4157271af97e77bcef71e92ee85333dcb
SHA256ca6dc8b1dada5e2f28db41874f2b572354e3e92f73d18a61404578b4173634bc
SHA512d14807668139f8e3d4b9076872419e59c3b268879b78b87ec7c79e0b01652dc55d5871e0870d8383b830d8bafae171f220b756503588e9c2486b7db5cdb4d161